Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2460: CWE-267 Privilege Defined with Unsafe Actions in Hitachi Energy Relion REB500

0
High
VulnerabilityCVE-2026-2460cvecve-2026-2460cwe-267
Published: Tue Feb 24 2026 (02/24/2026, 13:24:34 UTC)
Source: CVE Database V5
Vendor/Project: Hitachi Energy
Product: Relion REB500

Description

A vulnerability exists in REB500 for an authenticated user with low-level privileges to access and alter the content of directories by using the DAC protocol that the user is not authorized to do so.

AI-Powered Analysis

AILast updated: 02/24/2026, 14:16:28 UTC

Technical Analysis

CVE-2026-2460 is a vulnerability identified in Hitachi Energy's Relion REB500 product, specifically version 8.0.0.0. The flaw arises from improper privilege definitions (CWE-267), where an authenticated user with low-level privileges can exploit the DAC protocol to access and alter directory contents that they should not be authorized to manipulate. The DAC (Distributed Automation Communication) protocol, used for communication and control in energy automation systems, is leveraged here to bypass intended access controls. This vulnerability does not require user interaction but does require the attacker to have valid low-level credentials, which may be obtained through legitimate means or other attack vectors. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required beyond low-level (PR:L), no user interaction (UI:N), and high impact on confidentiality and integrity (VC:H, VI:H), with no impact on availability. The vulnerability could allow unauthorized data modification or disclosure within the system, potentially undermining operational integrity and confidentiality of critical energy infrastructure. No public exploits are known at this time, but the vulnerability's nature and affected product suggest a significant risk if weaponized. The lack of available patches at the time of publication necessitates immediate compensating controls to prevent exploitation.

Potential Impact

The vulnerability could have severe consequences for organizations operating critical energy infrastructure using the Relion REB500 product. Unauthorized access and modification of directory contents could lead to data tampering, disruption of automation processes, or leakage of sensitive operational data. This compromises the confidentiality and integrity of the system, potentially causing incorrect system behavior or outages. Given the product's role in energy automation, exploitation could impact grid stability and reliability, leading to broader operational and safety risks. Attackers with low-level credentials could escalate their influence within the system, undermining trust in the automation environment. The high CVSS score reflects the potential for significant damage, especially in environments where the Relion REB500 is deployed at scale. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits in the future.

Mitigation Recommendations

Organizations should immediately audit and restrict user privileges to the minimum necessary, ensuring that low-level users cannot access sensitive directories or functions. Network segmentation should be enforced to limit access to the DAC protocol interfaces only to trusted and authorized devices. Continuous monitoring and logging of DAC protocol traffic should be implemented to detect anomalous access patterns or unauthorized modifications. Since no patches are currently available, organizations should engage with Hitachi Energy for updates and apply any vendor-provided fixes promptly once released. Additionally, implementing multi-factor authentication (MFA) for all users accessing the system can reduce the risk of credential compromise. Regular security assessments and penetration testing focused on access control mechanisms within the Relion REB500 environment are recommended to identify and remediate similar privilege issues. Incident response plans should be updated to include scenarios involving unauthorized access via this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Hitachi Energy
Date Reserved
2026-02-13T11:08:27.300Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699daf6bbe58cf853bdddd65

Added to database: 2/24/2026, 2:02:19 PM

Last enriched: 2/24/2026, 2:16:28 PM

Last updated: 2/25/2026, 12:16:02 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats